A ___________ makes use of both signature and anomaly detection techniques to identify attacks.
Fill in the blank(s) with the appropriate word(s).
host-based IPS (HIPS)
Computer Science & Information Technology
You might also like to view...
Select the form control below that would be most appropriate to accept free-form comments about your website
a. select list b. text box c. scrolling text box d. None of the above
Computer Science & Information Technology
?A _____ identifies the number of pages in a website and shows how each page is linked to other pages.
A. ?wireframe B. ?prototype C. ?mockup D. ?sitemap
Computer Science & Information Technology